This system is for the use of authorized personnel only. By logging
onto this system, you are subject to the terms and conditions of
all Information Security policies and standards. Use by
unauthorized individuals or for unauthorized purposes is a
violation of federal and/or state law. The Company reserves the
right to take any necessary action to protect authorized users,
intellectual property and other information assets. Individuals
using this system are subject to having all of their activities on
this system monitored. Anyone using this system expressly consents
to such monitoring and is advised that if such monitoring reveals
possible evidence of criminal activity, system personnel may
provide the evidence of such monitoring to law enforcement
officials.